WO2012154976A2 - System and method for web-based security authentication - Google Patents

System and method for web-based security authentication Download PDF

Info

Publication number
WO2012154976A2
WO2012154976A2 PCT/US2012/037353 US2012037353W WO2012154976A2 WO 2012154976 A2 WO2012154976 A2 WO 2012154976A2 US 2012037353 W US2012037353 W US 2012037353W WO 2012154976 A2 WO2012154976 A2 WO 2012154976A2
Authority
WO
WIPO (PCT)
Prior art keywords
key values
values
user
graphical
security authentication
Prior art date
Application number
PCT/US2012/037353
Other languages
French (fr)
Other versions
WO2012154976A3 (en
Inventor
Chang Lee
Original Assignee
Softlayer Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softlayer Technologies, Inc. filed Critical Softlayer Technologies, Inc.
Priority to AU2012253411A priority Critical patent/AU2012253411B2/en
Priority to CA2833969A priority patent/CA2833969C/en
Priority to SG2013077078A priority patent/SG194509A1/en
Priority to CN201280022478.3A priority patent/CN103548299A/en
Priority to JP2014510471A priority patent/JP5777804B2/en
Priority to EP12782816.8A priority patent/EP2707992A4/en
Publication of WO2012154976A2 publication Critical patent/WO2012154976A2/en
Publication of WO2012154976A3 publication Critical patent/WO2012154976A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the present disclosure relates to a system and method for web-based security authentication.
  • Security data such as usernames, passwords, and PINs are commonly required for a user to access a number of computing resources including websites, financial accounts, shopping accounts, and other protected data.
  • a user may access the protected resource or data using a smartphone, a personal digital assistant, a tablet computer, a laptop, a desktop computer, a kiosk, an ATM terminal, a point-of-sale terminal, or other electronic devices.
  • a covert key logging software residing in the computing device is capable of capturing, recording and reporting keystrokes entered by the user.
  • the data communicated between the user device and the web server is also vulnerable to man-in-the-middle attacks.
  • Another form of attach commonly called cross-site request forgery, can exploit a user's authenticated identity at a website and cause an unauthorized action.
  • a security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and verifying that the decrypted key values match the login credential.
  • a security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input from a user including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and giving the user access to data associated with the user account in response to the decrypted key values matching the login credential.
  • a security authentication system comprises a security authentication server operable to: establish a user account associated with a login credential, generate an encryption salt, generate graphical key images of a plurality of sequences of values each beginning at a random point, and generate encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt.
  • the system further comprises a server operable to: receive the graphical key images and encrypted key values from the security authentication server, and incorporate the graphical key images and encrypted key values into a displayable input form.
  • the system further comprises an electronic device operable to: display the input form, receive user input from a user including a plurality of encrypted key values.
  • the security authentication server further operable to: receive the user input from the server, generate decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, verifying the decrypted key values with the login credential, and notifying the server of successful authentication.
  • a security authentication system comprises means for establishing a user account associated with a login credential, means for generating an encryption salt, means for generating graphical key images of a plurality of sequences of values each beginning at a random point, means for generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, means for incorporating the graphical key images and encrypted key values into a displayable input form, means for receiving user input including a plurality of encrypted key values, means for generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and means for verifying that the decrypted key values match the login credential.
  • a security authentication method comprises transmitting a request for login into a user account to a web server, receiving an input form from the web server having graphical key images of a plurality of sequences of values and encrypted key values, displaying the input form in a rotary dial format, receiving user input entered using the input form, and transmitting encrypted key values representing the user input to the web server for authentication.
  • FIG. 1 is a simplified block diagram of an exemplary embodiment of an electronic computing device
  • FIG. 2 is a simplified diagram of an exemplary web-based computing environment
  • FIG. 3 is a data flow diagram of an exemplary embodiment of a method for web-based access authentication
  • FIG. 4 is a diagram representation of key images for a three-digit security code according to an exemplary embodiment.
  • FIG. 5 is a diagram representation of a rotary dial representation of an input form of a plurality of sequences of values displayed by the electronic device.
  • FIG. 1 is a simplified block diagram of an exemplary embodiment of an electronic computing device 10.
  • the electronic device 10 may be any device or terminal, such as smartphone, a personal digital assistant, a tablet computer, a laptop, a desktop computer, a kiosks, an ATM terminal, a point-of-sale terminal, and other computing devices.
  • the electronic device 10 includes user interfaces such as a display screen 12 for displaying information to the user, and a keyboard and a mouse 13.
  • the keyboard includes a plurality of keys that enables the user to enter login data such as username, password, and PIN.
  • the mouse is a conventional pointing device that enables the user to position a cursor anywhere on the screen 12 and click on selected text or graphics.
  • the electronic device 10 further includes a CPU (central processing unit) 14 for executing software that performs processing, computing, decision, and communication functions.
  • a memory 16 in the form of RAM (random access memory), ROM (read-only memory), hard drive, and/or any suitable data storage device is used to store information needed for later retrieval and computation.
  • the electronic device 10 also includes a communication interface 18 that enables connections to the Internet, the World Wide Web, telecommunications networks, local area networks, wireless networks, and/or other suitable resources.
  • the electronic device 10 may further include other peripheral devices as desired.
  • the electronic device 10 may require a security code such as a password or PIN to operate and/or access information, accounts, or other protected resources.
  • a security code such as a password or PIN
  • a smartphone, personal digital assistant, or laptop computer may require a password to unlock the device to enable use.
  • the user must enter the correct login credential to access an online financial account, an online email account, a shopping website, a social media website, and a variety of other protected resources and data.
  • the user's login credentials are verified by a remote security authentication server/service that avoids certain security risks such as key logging, man-in-the-middle, and cross-site request forgery attacks.
  • FIG. 2 is a simplified diagram of an exemplary web-based security authentication environment.
  • Desktop computer 20, laptop computer 22, and smartphone 24 represent electronic devices that a user may use to access protected resources or data residing in a web server 28 via computer networks including the Internet and World Wide Web 26. As described above, other types of devices and terminals may also be used.
  • a security authentication server 30 also connected to the Internet and World Wide Web is capable of authenticating the login credentials entered by the user at the electronic devices without exposing them to security risks such as key logging, man-in-the-middle, and cross-site request forgery attacks.
  • the authentication server 30 may be one or more computing devices, virtual machines, or other computing entities including necessary operating systems, network drivers and configurations, and other software.
  • the electronic devices may connect to the Internet and World Wide Web through other intermediate wired and wireless computer and telecommunications networks.
  • FIG. 3 is a data flow diagram of an exemplary embodiment of a method for web-based access authentication.
  • This diagram provides a simplified representative data flow between the user device 20-24, the web server 28 having resources that the user desires access, and the security authentication server 30 that performs the login authentication functions.
  • the user using a web browser running on the electronic device, first requests a login web page from the web server 28, and the web server 28 transmits the login web page to the user's device, as shown in steps 32 and 34.
  • the user's device then renders the login web page, which includes a text entry field for the user to enter login credentials such as a unique username, as shown in step 36.
  • the user enters the username, represented in this example by "ABC,” which is transmitted to the web server in step 38.
  • the web server 28 then passes the username along with a request for randomized security data to the security authentication server 30, as shown in step 40.
  • the security authentication server 30 generates an encryption salt, which is a string of random bits of a predetermined length, and key images, as shown in step 42.
  • the key images for a three-digit numerical PIN code example would be three independent series of numerals in sequence, each starting at a random point. For example as shown in FIG. 4, the key images of the first series 62 begins at 4 and ends at 3, the second series 64 begins at 7 and ends at 6, and the third series 66 begins at 9 and ends at 8.
  • the security authentication server 30 further generates the corresponding encrypted value for each numeral in the key images using the generated encryption salt.
  • step 44 the username and the randomized security data that include the key images and encrypted values are transmitted to the web server 28.
  • a location reference where the key images are stored and accessible is transmitted, such as a URL (Uniform Resource Locator).
  • the web server 28 generates an input form using the key image URL and encrypted values, as shown in step 46.
  • the input form may be in HTML (Hypertext Markup Language) and incorporates the key images.
  • each of the numerals in the key images are encoded with a value that is generated with the encryption salt by the security authentication server 30. Therefore, clicking on any numeral by the user generates the corresponding encrypted value. For example, clicking on an image of "2" may generate the encrypted value, ur8etree; and clicking on an image of "3" may generate the encrypted value, rEr8rr3d. Accordingly, for a numerical PIN, each numeral has a corresponding encrypted value.
  • the input form is then transmitted to the user's electronic device in step 48.
  • the electronic device renders the input form on the display screen that includes the key images, where the numerals are each associated with an encrypted value.
  • FIG. 5 An example is shown in which the key images may be displayed in the form of scrollable wheels or dials 70, where the user may scroll up and down along the sequences of numerals using the up and down arrows or mouse scroll wheel, for example.
  • the user may enter the security code or PIN by clicking on the appropriate numeral key images in the input form. Once a digit of the PIN is selected, the numerals in that sequence are obfuscated so that the selected numeral is not displayed. Scrolling would cause the obfuscated numerals to again be displayed.
  • the user may submit the input form. This causes the user's encrypted PIN input to be transmitted to the web server 28, as shown in step 52.
  • the web server 28 transmits the encrypted user input along with the username to the security authentication server 30, as shown in step 54.
  • the security authentication server 30 determines whether the corresponding values of the encrypted user input are the correct PIN values for that particular user, and authenticates the login credentials, as shown in step 56. If the received encrypted values do not correctly correspond to the user's security code or PIN stored at the security authentication server 30, then authentication fails, and the user's access is denied. The security authentication server 30 further deletes or otherwise renders unusable the key images and encryption salt used in this session.
  • the authentication approval or denial is then conveyed to the web server 28 in step 58. If the user's credentials are approved, the user may proceed in the login process, as shown in step 60.
  • the approval or denial is in turn conveyed to the user's electronic device in step 62. If approval, the user gains access to the website or other protected resources and data, as shown in steps 64 and 66. However, if access is denied, the user is barred from obtaining the protected data and accessing the resources.
  • the user may have a predetermined number of tries to enter the correct login credentials. Each time the user requests access to protected resources or data, new key images, the encryption salt, and encrypted values are generated and used for that session.
  • An API application program interface
  • executing on the security authentication server 30 may be used to perform the functions of communicating with the web server 28, receiving requests for key images, transmitting the requested key images to the web server, and validating the encrypted login credentials.
  • An API conforming to the REST (Representational State Transfer) constraints (RESTful) or another suitable architecture may be used.
  • the key images transmitted from the API to the web server 28 may be in the JSON (JavaScript Object Notation) format or another suitable format.
  • An HTML widget executing on the user's electronic device may be used to "add" the security code input form to the HTML web page that is displayed to request entry of the login credential.
  • the security authentication server 30 may additionally generate the input form and provide a location reference thereto to the electronic device. The widget in the electronic device is then operable to display the input form with the graphical key images by referencing the location reference.
  • the web server 28 and the security authentication server 30 may be separate servers as shown in FIGS. 2 and 3, or may be an integrated server if desired.

Abstract

A security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and verifying that the decrypted key values match the login credential.

Description

SYSTEM AND METHOD FOR WEB-BASED SECURITY AUTHENTICATION FIELD
[0001] The present disclosure relates to a system and method for web-based security authentication.
BACKGROUND
[0002] Security data such as usernames, passwords, and PINs are commonly required for a user to access a number of computing resources including websites, financial accounts, shopping accounts, and other protected data. A user may access the protected resource or data using a smartphone, a personal digital assistant, a tablet computer, a laptop, a desktop computer, a kiosk, an ATM terminal, a point-of-sale terminal, or other electronic devices.
[0003] The entry of login credentials such as username, password, and PIN data are vulnerable to at least three types of known attack techniques. A covert key logging software residing in the computing device is capable of capturing, recording and reporting keystrokes entered by the user. In scenarios where the user uses a web browser to access a web resource or for authentication, the data communicated between the user device and the web server is also vulnerable to man-in-the-middle attacks. Another form of attach, commonly called cross-site request forgery, can exploit a user's authenticated identity at a website and cause an unauthorized action. These and other security risks may expose the user's protected resources and data to unauthorized access. Accordingly, a need arises for a solution to greatly minimize or eliminate such unauthorized access to confidential and protected data and resources. SUMMARY
[0004] A system and method have been envisioned for web-based security authentication.
[0005] A security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and verifying that the decrypted key values match the login credential.
[0006] A security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input from a user including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and giving the user access to data associated with the user account in response to the decrypted key values matching the login credential. [0007] A security authentication system comprises a security authentication server operable to: establish a user account associated with a login credential, generate an encryption salt, generate graphical key images of a plurality of sequences of values each beginning at a random point, and generate encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt. The system further comprises a server operable to: receive the graphical key images and encrypted key values from the security authentication server, and incorporate the graphical key images and encrypted key values into a displayable input form. The system further comprises an electronic device operable to: display the input form, receive user input from a user including a plurality of encrypted key values. The security authentication server further operable to: receive the user input from the server, generate decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, verifying the decrypted key values with the login credential, and notifying the server of successful authentication.
[0008] A security authentication system comprises means for establishing a user account associated with a login credential, means for generating an encryption salt, means for generating graphical key images of a plurality of sequences of values each beginning at a random point, means for generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, means for incorporating the graphical key images and encrypted key values into a displayable input form, means for receiving user input including a plurality of encrypted key values, means for generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and means for verifying that the decrypted key values match the login credential.
[0009] A security authentication method comprises transmitting a request for login into a user account to a web server, receiving an input form from the web server having graphical key images of a plurality of sequences of values and encrypted key values, displaying the input form in a rotary dial format, receiving user input entered using the input form, and transmitting encrypted key values representing the user input to the web server for authentication.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] FIG. 1 is a simplified block diagram of an exemplary embodiment of an electronic computing device;
[0011] FIG. 2 is a simplified diagram of an exemplary web-based computing environment;
[0012] FIG. 3 is a data flow diagram of an exemplary embodiment of a method for web-based access authentication;
[0013] FIG. 4 is a diagram representation of key images for a three-digit security code according to an exemplary embodiment; and
[0014] FIG. 5 is a diagram representation of a rotary dial representation of an input form of a plurality of sequences of values displayed by the electronic device. DETAILED DESCRIPTION
[0015] FIG. 1 is a simplified block diagram of an exemplary embodiment of an electronic computing device 10. The electronic device 10 may be any device or terminal, such as smartphone, a personal digital assistant, a tablet computer, a laptop, a desktop computer, a kiosks, an ATM terminal, a point-of-sale terminal, and other computing devices. The electronic device 10 includes user interfaces such as a display screen 12 for displaying information to the user, and a keyboard and a mouse 13. The keyboard includes a plurality of keys that enables the user to enter login data such as username, password, and PIN. The mouse is a conventional pointing device that enables the user to position a cursor anywhere on the screen 12 and click on selected text or graphics. Other pointing devices such as a touchpad, joystick, trackball, trackpad, and similar devices may be employed. The electronic device 10 further includes a CPU (central processing unit) 14 for executing software that performs processing, computing, decision, and communication functions. A memory 16 in the form of RAM (random access memory), ROM (read-only memory), hard drive, and/or any suitable data storage device is used to store information needed for later retrieval and computation. The electronic device 10 also includes a communication interface 18 that enables connections to the Internet, the World Wide Web, telecommunications networks, local area networks, wireless networks, and/or other suitable resources. The electronic device 10 may further include other peripheral devices as desired.
[0016] The electronic device 10 may require a security code such as a password or PIN to operate and/or access information, accounts, or other protected resources. For example, a smartphone, personal digital assistant, or laptop computer may require a password to unlock the device to enable use. As another example, the user must enter the correct login credential to access an online financial account, an online email account, a shopping website, a social media website, and a variety of other protected resources and data. In the system and method described below, the user's login credentials are verified by a remote security authentication server/service that avoids certain security risks such as key logging, man-in-the-middle, and cross-site request forgery attacks.
[0017] FIG. 2 is a simplified diagram of an exemplary web-based security authentication environment. Desktop computer 20, laptop computer 22, and smartphone 24 represent electronic devices that a user may use to access protected resources or data residing in a web server 28 via computer networks including the Internet and World Wide Web 26. As described above, other types of devices and terminals may also be used. A security authentication server 30 also connected to the Internet and World Wide Web is capable of authenticating the login credentials entered by the user at the electronic devices without exposing them to security risks such as key logging, man-in-the-middle, and cross-site request forgery attacks. The authentication server 30 may be one or more computing devices, virtual machines, or other computing entities including necessary operating systems, network drivers and configurations, and other software. Although not shown explicitly, the electronic devices may connect to the Internet and World Wide Web through other intermediate wired and wireless computer and telecommunications networks.
[0018] FIG. 3 is a data flow diagram of an exemplary embodiment of a method for web-based access authentication. This diagram provides a simplified representative data flow between the user device 20-24, the web server 28 having resources that the user desires access, and the security authentication server 30 that performs the login authentication functions. The user, using a web browser running on the electronic device, first requests a login web page from the web server 28, and the web server 28 transmits the login web page to the user's device, as shown in steps 32 and 34. The user's device then renders the login web page, which includes a text entry field for the user to enter login credentials such as a unique username, as shown in step 36. The user enters the username, represented in this example by "ABC," which is transmitted to the web server in step 38. The web server 28 then passes the username along with a request for randomized security data to the security authentication server 30, as shown in step 40.
[0019] In response, the security authentication server 30 generates an encryption salt, which is a string of random bits of a predetermined length, and key images, as shown in step 42. The key images for a three-digit numerical PIN code example would be three independent series of numerals in sequence, each starting at a random point. For example as shown in FIG. 4, the key images of the first series 62 begins at 4 and ends at 3, the second series 64 begins at 7 and ends at 6, and the third series 66 begins at 9 and ends at 8. The security authentication server 30 further generates the corresponding encrypted value for each numeral in the key images using the generated encryption salt. For example, numeral 0 may correspond to "rTcee3rd," numeral 1 may correspond to "grru6erd," numeral 2 may correspond to "ur8etree," etc. In step 44, the username and the randomized security data that include the key images and encrypted values are transmitted to the web server 28. Preferably, only a location reference where the key images are stored and accessible is transmitted, such as a URL (Uniform Resource Locator).
[0020] In response, the web server 28 generates an input form using the key image URL and encrypted values, as shown in step 46. The input form may be in HTML (Hypertext Markup Language) and incorporates the key images. As described above, each of the numerals in the key images are encoded with a value that is generated with the encryption salt by the security authentication server 30. Therefore, clicking on any numeral by the user generates the corresponding encrypted value. For example, clicking on an image of "2" may generate the encrypted value, ur8etree; and clicking on an image of "3" may generate the encrypted value, rEr8rr3d. Accordingly, for a numerical PIN, each numeral has a corresponding encrypted value. The input form is then transmitted to the user's electronic device in step 48.
[0021] In step 50, the electronic device renders the input form on the display screen that includes the key images, where the numerals are each associated with an encrypted value. An example is shown in FIG. 5 in which the key images may be displayed in the form of scrollable wheels or dials 70, where the user may scroll up and down along the sequences of numerals using the up and down arrows or mouse scroll wheel, for example. The user may enter the security code or PIN by clicking on the appropriate numeral key images in the input form. Once a digit of the PIN is selected, the numerals in that sequence are obfuscated so that the selected numeral is not displayed. Scrolling would cause the obfuscated numerals to again be displayed. Once the user selects all three digits of the PIN code, the user may submit the input form. This causes the user's encrypted PIN input to be transmitted to the web server 28, as shown in step 52.
[0022] The web server 28 in turn transmits the encrypted user input along with the username to the security authentication server 30, as shown in step 54. The security authentication server 30 determines whether the corresponding values of the encrypted user input are the correct PIN values for that particular user, and authenticates the login credentials, as shown in step 56. If the received encrypted values do not correctly correspond to the user's security code or PIN stored at the security authentication server 30, then authentication fails, and the user's access is denied. The security authentication server 30 further deletes or otherwise renders unusable the key images and encryption salt used in this session. The authentication approval or denial is then conveyed to the web server 28 in step 58. If the user's credentials are approved, the user may proceed in the login process, as shown in step 60. The approval or denial is in turn conveyed to the user's electronic device in step 62. If approval, the user gains access to the website or other protected resources and data, as shown in steps 64 and 66. However, if access is denied, the user is barred from obtaining the protected data and accessing the resources.
[0023] The user may have a predetermined number of tries to enter the correct login credentials. Each time the user requests access to protected resources or data, new key images, the encryption salt, and encrypted values are generated and used for that session.
[0024] An API (application program interface) executing on the security authentication server 30 may be used to perform the functions of communicating with the web server 28, receiving requests for key images, transmitting the requested key images to the web server, and validating the encrypted login credentials. An API conforming to the REST (Representational State Transfer) constraints (RESTful) or another suitable architecture may be used. The key images transmitted from the API to the web server 28 may be in the JSON (JavaScript Object Notation) format or another suitable format. An HTML widget executing on the user's electronic device may be used to "add" the security code input form to the HTML web page that is displayed to request entry of the login credential. [0025] Although the method and data flow described above provide that certain functions or steps are carried out at a particular situs or in a particular manner, the system and method are not so limited. For example, the security authentication server 30 may additionally generate the input form and provide a location reference thereto to the electronic device. The widget in the electronic device is then operable to display the input form with the graphical key images by referencing the location reference. Further, the web server 28 and the security authentication server 30 may be separate servers as shown in FIGS. 2 and 3, or may be an integrated server if desired.
[0026] The features of the present invention which are believed to be novel are set forth below with particularity in the appended claims. However, modifications, variations, and changes to the exemplary embodiments described above will be apparent to those skilled in the art, and the system and method described herein thus encompass such modifications, variations, and changes and are not limited to the specific embodiments described herein.

Claims

WHAT IS CLAIMED IS:
1. A security authentication method comprising:
establishing a user account associated with a login credential;
generating an encryption salt;
generating graphical key images of a plurality of sequences of values each beginning at a random point;
generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt;
incorporating the graphical key images and encrypted key values into a displayable input form;
receiving user input from a user including a plurality of encrypted key values; generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt; and
giving the user access to data associated with the user account in response to the decrypted key values matching the login credential.
2. The security authentication method of claim 1, further comprising displaying the input form including the graphical key images and encrypted key values to the user using an electronic device.
3. The security authentication method of claim 2, wherein displaying the input form further comprises displaying the plurality of graphical key images in a rotary dial graphical representation.
4. The security authentication method of claim 3, further comprising enabling the user to enter the login credential by clicking on the displayed graphical key images.
5. The security authentication method of claim 1, further comprising receiving a request for randomized security data at a security authentication server from a server hosting data associated with the user account.
6. The security authentication method of claim 5, further comprising:
transmitting the randomized security data including the graphical key images and encrypted key values to the server;
generating the displayable input form incorporating the graphical key images and encrypted key values at the server;
transmitting the displayable input form to an electronic device used by the user; and
displaying the input form at the electronic device.
7. The security authentication method of claim 6, wherein transmitting the randomized security data comprises transmitting a location reference of the graphical key images to the server.
8. A security authentication method comprising:
establishing a user account associated with a login credential;
generating an encryption salt;
generating graphical key images of a plurality of sequences of values each beginning at a random point;
generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt;
incorporating the graphical key images and encrypted key values into a displayable input form;
receiving user input including a plurality of encrypted key values;
generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt; and
verifying that the decrypted key values match the login credential.
9. A security authentication system comprising:
a security authentication server operable to:
establish a user account associated with a login credential; generate an encryption salt;
generate graphical key images of a plurality of sequences of values each beginning at a random point;
generate encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt;
a server operable to: receive the graphical key images and encrypted key values from the security authentication server; and
incorporate the graphical key images and encrypted key values into a displayable input form; and
an electronic device operable to:
display the input form;
receive user input from a user including a plurality of encrypted key values; and
the security authentication server further operable to:
receive the user input from the server;
generate decrypted key values by decrypting the encrypted key values of the user input using the encryption salt;
verifying the decrypted key values with the login credential; and
notifying the server of successful authentication.
10. The system of claim 9, wherein the electronic device is operable to display the input form in the form of rotary dials incorporating the graphical key images of the sequences of values.
11. The system of claim 10, wherein the electronic device is operable to enable the user to enter the login credential by clicking on the displayed graphical key images.
12. The system of claim 9, further comprising giving the user access to data associated with the user account in response to the decrypted key values matching the login credential.
13. A security authentication system comprising:
means for establishing a user account associated with a login credential;
means for generating an encryption salt;
means for generating graphical key images of a plurality of sequences of values each beginning at a random point;
means for generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt;
means for incorporating the graphical key images and encrypted key values into a displayable input form;
means for receiving user input including a plurality of encrypted key values;
means for generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt; and
means for verifying that the decrypted key values match the login credential.
14. A security authentication method comprising:
transmitting a request for login into a user account to a web server;
receiving an input form from the web server having graphical key images of a plurality of sequences of values and encrypted key values;
displaying the input form in a rotary dial format;
receiving user input entered using the input form; and
transmitting encrypted key values representing the user input to the web server for authentication.
PCT/US2012/037353 2011-05-10 2012-05-10 System and method for web-based security authentication WO2012154976A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
AU2012253411A AU2012253411B2 (en) 2011-05-10 2012-05-10 System and method for web-based security authentication
CA2833969A CA2833969C (en) 2011-05-10 2012-05-10 System and method for web-based security authentication
SG2013077078A SG194509A1 (en) 2011-05-10 2012-05-10 System and method for web-based security authentication
CN201280022478.3A CN103548299A (en) 2011-05-10 2012-05-10 System and method for web-based security authentication
JP2014510471A JP5777804B2 (en) 2011-05-10 2012-05-10 Web-based security authentication system and method
EP12782816.8A EP2707992A4 (en) 2011-05-10 2012-05-10 System and method for web-based security authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/104,535 US8738908B2 (en) 2011-05-10 2011-05-10 System and method for web-based security authentication
US13/104,535 2011-05-10

Publications (2)

Publication Number Publication Date
WO2012154976A2 true WO2012154976A2 (en) 2012-11-15
WO2012154976A3 WO2012154976A3 (en) 2013-05-10

Family

ID=47140011

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/037353 WO2012154976A2 (en) 2011-05-10 2012-05-10 System and method for web-based security authentication

Country Status (8)

Country Link
US (2) US8738908B2 (en)
EP (1) EP2707992A4 (en)
JP (1) JP5777804B2 (en)
CN (1) CN103548299A (en)
AU (1) AU2012253411B2 (en)
CA (1) CA2833969C (en)
SG (1) SG194509A1 (en)
WO (1) WO2012154976A2 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9015489B2 (en) * 2010-04-07 2015-04-21 Microsoft Technology Licensing, Llc Securing passwords against dictionary attacks
US8738908B2 (en) 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication
US8935777B2 (en) 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
EP2701415A1 (en) * 2012-08-24 2014-02-26 Raja Kuppuswamy Mobile electronic device and use thereof for electronic transactions
US8880885B2 (en) * 2012-10-09 2014-11-04 Sap Se Mutual authentication schemes
WO2016209273A1 (en) 2015-06-26 2016-12-29 Halliburton Energy Services, Inc. Antennas for wellbore logging tools and methods of manufacture
CN105430022B (en) * 2015-12-31 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of data input control method and terminal device
CN106126986B (en) * 2016-06-15 2020-07-10 北京小米移动软件有限公司 Unlocking processing method and device for locked data partition
CN108400875B (en) * 2018-03-21 2021-03-12 苏州科达科技股份有限公司 Key value-based authorization authentication method, system, electronic device and storage medium
US11005971B2 (en) * 2018-08-02 2021-05-11 Paul Swengler System and method for user device authentication or identity validation without passwords or matching tokens
RU2754240C1 (en) * 2020-12-16 2021-08-30 ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "КуРэйт" (ООО "КуРэйт") Method and system for confirming transactions using a randomly generated graphical key
US11830383B2 (en) 2021-09-08 2023-11-28 PassiveLogic, Inc. External activating of quiescent device
CN115242558B (en) * 2022-09-22 2022-12-09 城云科技(中国)有限公司 API interface security encryption method, authentication method, device and readable storage medium

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5060263A (en) * 1988-03-09 1991-10-22 Enigma Logic, Inc. Computer access control system and method
US5717760A (en) * 1994-11-09 1998-02-10 Channel One Communications, Inc. Message protection system and method
JPH11191094A (en) * 1997-12-26 1999-07-13 Nec Eng Ltd Password number input device
JP2005317045A (en) * 1999-08-04 2005-11-10 Toshihiro Habu Information input device
US7203838B1 (en) * 1999-09-09 2007-04-10 American Express Travel Related Services Company, Inc. System and method for authenticating a web page
AU7116800A (en) * 1999-09-09 2001-04-10 American Express Travel Related Services Company, Inc. System and method for authenticating a web page
JP3416626B2 (en) * 2000-07-31 2003-06-16 松下電器産業株式会社 Identification information input device
US7251635B2 (en) * 2002-02-25 2007-07-31 Schlumberger Omnes, Inc. Method and apparatus for managing a key management system
US7370209B2 (en) * 2003-01-30 2008-05-06 Hewlett-Packard Development Company, L.P. Systems and methods for increasing the difficulty of data sniffing
JP5058600B2 (en) * 2003-09-12 2012-10-24 イーエムシー コーポレイション System and method for providing contactless authentication
US7616764B2 (en) 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
WO2006003675A2 (en) * 2004-07-12 2006-01-12 Syed Ibrahim Abdul Hameed Khan System, method of generation and use of bilaterally generated variable instant passwords
IES20050147A2 (en) * 2005-03-21 2007-05-02 Patrick Mckenna Securing access authorisation
JP2006270790A (en) * 2005-03-25 2006-10-05 Oki Electric Ind Co Ltd Password input device, its input method and information processor
US7783893B2 (en) * 2005-07-06 2010-08-24 Victor Gorelik Secure biometric authentication scheme
JP4851179B2 (en) * 2005-12-16 2012-01-11 株式会社三菱東京Ufj銀行 COMMUNICATION METHOD, COMMUNICATION DEVICE, INFORMATION COMMUNICATION SYSTEM, AND PROGRAM
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
US7841000B2 (en) * 2006-10-16 2010-11-23 Lenovo (Singapore) Pte. Ltd. Authentication password storage method and generation method, user authentication method, and computer
US7941834B2 (en) * 2007-04-05 2011-05-10 Microsoft Corporation Secure web-based user authentication
US20080263361A1 (en) 2007-04-20 2008-10-23 Microsoft Corporation Cryptographically strong key derivation using password, audio-visual and mental means
US8255696B2 (en) * 2007-05-01 2012-08-28 Microsoft Corporation One-time password access to password-protected accounts
US20090150983A1 (en) 2007-08-27 2009-06-11 Infosys Technologies Limited System and method for monitoring human interaction
US8261334B2 (en) 2008-04-25 2012-09-04 Yodlee Inc. System for performing web authentication of a user by proxy
US8225109B1 (en) * 2008-04-30 2012-07-17 Netapp, Inc. Method and apparatus for generating a compressed and encrypted baseline backup
US8156333B2 (en) * 2008-05-29 2012-04-10 Red Hat, Inc. Username based authentication security
US20100014662A1 (en) * 2008-06-19 2010-01-21 Sami Antti Jutila Method, apparatus and computer program product for providing trusted storage of temporary subscriber data
US8335931B2 (en) 2008-06-20 2012-12-18 Imation Corp. Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments
US20110055585A1 (en) * 2008-07-25 2011-03-03 Kok-Wah Lee Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
US8307433B2 (en) * 2009-11-20 2012-11-06 College Of William And Mary Client side username/password credential protection
US9225526B2 (en) * 2009-11-30 2015-12-29 Red Hat, Inc. Multifactor username based authentication
US8850219B2 (en) * 2010-05-13 2014-09-30 Salesforce.Com, Inc. Secure communications
US20120159168A1 (en) * 2010-12-17 2012-06-21 Daniel Castro Authenticated communication association
US8738908B2 (en) 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of EP2707992A4 *

Also Published As

Publication number Publication date
CA2833969A1 (en) 2012-11-15
CA2833969C (en) 2017-04-11
SG194509A1 (en) 2013-12-30
JP2014517966A (en) 2014-07-24
US20120290838A1 (en) 2012-11-15
US20140223190A1 (en) 2014-08-07
US8738908B2 (en) 2014-05-27
WO2012154976A3 (en) 2013-05-10
JP5777804B2 (en) 2015-09-09
AU2012253411B2 (en) 2015-09-17
AU2012253411A1 (en) 2013-11-14
CN103548299A (en) 2014-01-29
EP2707992A4 (en) 2015-04-22
EP2707992A2 (en) 2014-03-19
US8930708B2 (en) 2015-01-06

Similar Documents

Publication Publication Date Title
US8930708B2 (en) Web-based security authentication
US11716315B2 (en) Disposable browsers and authentication techniques for a secure online user environment
US8255696B2 (en) One-time password access to password-protected accounts
EP2839603B1 (en) Abstracted and randomized one-time passwords for transactional authentication
US9191394B2 (en) Protecting user credentials from a computing device
EP2314046B1 (en) Credential management system and method
US8918849B2 (en) Secure user credential control
WO2009039223A1 (en) Methods and systems for management of image-based password accounts
CN104253812A (en) Delegating authentication for a web service
US20120260326A1 (en) Image maps for credential-based security
US8984599B2 (en) Real time password generation apparatus and method
AU2021301464A1 (en) Method and system for verification of identify of a user
JP2007065789A (en) Authentication system and method
US20150007293A1 (en) User authentication utilizing patterns
EP2523140B1 (en) Secure user credential control
Al-Sinani et al. Using CardSpace as a Password-based Single Sign-on System
Boneh et al. Snap2Pass: Consumer-Friendly Challenge-Response Authentication with a Phone
CN103312674A (en) Website login method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12782816

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2012782816

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2833969

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2014510471

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2012253411

Country of ref document: AU

Date of ref document: 20120510

Kind code of ref document: A